A Secure Management Scheme Designed in Cloud

2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS)(2016)

Cited 2|Views0
No score
Abstract
At present, the security has become an important issue in the field of cloud computing. The importance and urgency of the problem cannot be ignored. The popularization and application of cloud computing is a great challenge and opportunity in the field of information security in recent years. It can be seen that cloud computing security is changing to a hot spot for technology and academic research in cloud computing. This paper is aim to solve the problem of Cloud Security. According to the unique properties of cloud computing security, it proposes a secure management scheme in cloud computing. This scheme is used to detect the hacker attacks, illegal operation, potential threats and other security events in time based on big data. There are three main sections in the scheme: vulnerability scan, system log collection, correlation analysis. They are simply introduced and analyzed in this paper. Vulnerability scan: regular using of Nikto, Sandcat or other security tools for the cloud system to carry out the vulnerability scanning, regular network security self-testing, and building an extremely detailed scan report. System log collection: Using of Splunk, Nagios or other tools to collect the system log, also building a detailed log report. Correlation analysis: through the correlation analysis or canonical correlation analysis is used on the system log reports and vulnerability scanning reports, the attacker's attack will be found and the system will be issued a warning in time. At last, the scheme was built in the company's test environment, then the test environment was attacked by penetration test which is to simulate the act of hacking, the feasibility and function of it are verified by the testing.
More
Translated text
Key words
Cloud computing,Cloud security,Secure Management Scheme,Vulnerability scan,Correlation analysis
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined